Home page logo
/

pen-test logo Penetration Testing mailing list archives

Paros 3.2.12 Release
From: contact () parosproxy org
Date: 16 May 2006 15:58:42 -0000

Paros 3.2.12 is released.  This version is a maintenance release which fix a potental 100% cpu consumption issue.  All 
users are recommended to upgrade to this version.

The new verison is available at http://www.parosproxy.org.  Bug reports and comments on Paros can be sent to [contact 
at parosproxy org] or posted to can be posted to http://sourceforge.net/projects/paros.

[Installation]


If you have installed the old version on or after 3.2.4, you can directly install this new version.  If you are using 
version prior to 3.2.4, you should uninstall the old version first.  Default installation will use a maximum VM size of 
64M. For large application testing, you may adjust it depending on your need and the memory you have (eg 128M)



[introduction]


Paros is a man-in-the-middle proxy and application vulnerability scanner. It allows users to intercept, modify and 
debug HTTP and HTTPS data on-the-fly between web server and client browser. It also supports spidering, proxy-chaining, 
filtering and application vulnerability scanning.

[License] - Clarified Artistic License (open source and GPL-compatible license)

[Details/new features]


New
-       Use newest external library for HTTP handling.
-       enable/disable spider to POST forms in options panel to avoid generating unwanted traffic (default to enable). 
This is requested by many users.
-       Decrease the number of possible combinations crawled by spider on forms with multiple SELECT/OPTIONS. This make 
crawling less resource consuming and lower chance to affect application being scanned.
-       Minor UI changes.

Fix
-       Fallback database library to previous version as in Paros 3.2.10 because of a problem with hsqldb where some 
byte combination may consume 100% cpu time.
-       Increase width of method display in history to cater for other longer method names.
-       Default file scans may display incorrect HTTP message body if the original message is a POST request.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
  • Paros 3.2.12 Release contact (May 16)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]